n8n-mcp is vulnerable to Server-Side Request Forgery (SSRF)
71
High Risk
n8n-mcp exposes webhook and API client flows that fetch attacker-influenced URLs behind SSRF checks. The prior validation could resolve a hostname once while the actual outbound HTTP connection could land on a different address later, which matches a DNS rebinding time-of-check/time-of-use gap. Redirect following widened how far a single allowed URL could pivot before pinning. The patch carries forward resolved address metadata and pins connections to the validated IP while stopping redirects so the transport matches the decision that passed SSRF policy.
You are affected if you are using a version that falls within the vulnerable range.
n8n-mcp is vulnerable to Server-Side Request Forgery (SSRF) in versions 2.18.7 - 2.50.1.
Upgrade the n8n-mcp library to the patch version.
Connect your repositories to instantly see whether vulnerable or malicious packages exist in your codebase.
Free. No credit card required.

SOC 2Compliant
ISO 27001Compliant